Hello,
I think that you are referring to a SQL injection attack over a website of your own, it is correct? It is important to know that not all the websites have SQL injection vulnerabilities. The first step is to identify vulnerable functionalities in order to design a specific attack over it if a SQL injection vulnerability exists. I have experience in this type of hacking attacks, so i think that we can work together.
Do not hesitate to contact me if you need any further information.